Tesis sobre el tema "Management science"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Management science".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Chada, Daniel de Magalhães. "From cognitive science to management science: two computational contributions". reponame:Repositório Institucional do FGV, 2011. http://hdl.handle.net/10438/17053.
Texto completoApproved for entry into archive by Kelly Ayala (kelly.ayala@fgv.br) on 2016-09-12T12:58:17Z (GMT) No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5)
Approved for entry into archive by Kelly Ayala (kelly.ayala@fgv.br) on 2016-09-12T13:00:07Z (GMT) No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5)
Made available in DSpace on 2016-09-12T13:03:31Z (GMT). No. of bitstreams: 1 Chada 2011 FINAL ENTREGUE.pdf: 579283 bytes, checksum: f463590c20f51b84ba0f9357ab1a6e08 (MD5) Previous issue date: 2011
This work is composed of two contributions. One borrows from the work of Charles Kemp and Joshua Tenenbaum, concerning the discovery of structural form: their model is used to study the Business Week Rankings of U.S. Business Schools, and to investigate how other structural forms (structured visualizations) of the same information used to generate the rankings can bring insights into the space of business schools in the U.S., and into rankings in general. The other essay is purely theoretical in nature. It is a study to develop a model of human memory that does not exceed our (human) psychological short-term memory limitations. This study is based on Pentti Kanerva’s Sparse Distributed Memory, in which human memories are registered into a vast (but virtual) memory space, and this registration occurs in massively parallel and distributed fashion, in ideal neurons.
Este trabalho é composto de duas contribuições. Uma se usa do trabalhode Charles Kemp e Joshua Tenenbaum sobre a descoberta da forma estrutural: o seu modelo é usado para estudar os rankings da revista Business Week sobre escolas de administração, e para investigar como outras formas estruturais (visualizações estruturadas) da mesma informação usada para gerar os rankings pode trazer discernimento no espaço de escolas de negócios nos Estados Unidos e em rankings em geral. O outro ensaio é de natureza puramente teórica. Ele é um estudo no desenvolvimento de um modelo de memória que não excede os nossos (humanos) limites de memória de curto-prazo. Este estudo se baseia na Sparse Distributed Memory (Memória Esparsa e Distribuida) de Pentti Kanerva, na qual memórias humanas são registradas em um vasto (mas virtual) espaço, e este registro ocorre de forma maciçamente paralela e distribuida, em neurons ideais.
Yan, Kwan-shing y 甄君成. "Management science: quenes in cinemas". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31267798.
Texto completoYan, Kwan-shing. "Management science : quenes in cinemas /". Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18024646.
Texto completoBrogliato, Marcelo Salhab. "Essays in computational management science". reponame:Repositório Institucional do FGV, 2018. http://hdl.handle.net/10438/24615.
Texto completoApproved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2018-08-24T16:29:40Z (GMT) No. of bitstreams: 1 brogliato-phd-thesis-v3-final.pdf: 19935806 bytes, checksum: df0caf31076cfec5c116e0b4c18346ee (MD5)
Made available in DSpace on 2018-08-27T13:54:00Z (GMT). No. of bitstreams: 1 brogliato-phd-thesis-v3-final.pdf: 19935806 bytes, checksum: df0caf31076cfec5c116e0b4c18346ee (MD5) Previous issue date: 2018-07-15
A presente tese é formada por três trabalhos científicos na área de Management Science Computacional. A gestão moderna e a alta tecnologia interagem em múltiplas e profundas formas. O professor Andre Ng diz aos seus estudantes na Escola de Negócios de Stanford que “Inteligência Artificial é a nova eletricidade”, como sua forma hiperbólica de enfatizar o potencial transformador da tecnologia. O primeiro trabalho é inspirado na possibilidade de que haverá alguma forma de dinheiro digital e estuda ledger distribuídas, propondo e analisando o Hathor, uma arquitetura alternativa para criptomoedas escaláveis. O segundo trabalho pode ser um item crucial no entendimento de tomadas de decisão, nos trazendo um modelo formal de recognition-primed decisions. Situada na intersecção entre psicologia cognitiva, ciência da computação, neuro-ciência e inteligência artifical, ele apresenta um framework open-source, multi-plataforma e altamente paralelo da Sparse Distributed Memory e analisa a dinâmica da memória e algumas aplicações. O terceiro e último trabalho se situa na intersecção entre marketing, difusão de inovação tecnologica e modelagem, extendendo o famoso modelo de Bass para levar em consideração usuário que, após adotar a tecnologia por um tempo, decidiram rejeitá-la.
This thesis presents three specific, self-contained, scientific papers in the Computational Management Science area. Modern management and high technology interact in multiple, profound, ways. Professor Andrew Ng tells students at Stanford’s Graduate School of Business that “AI is the new electricity”, as his hyperbolic way to emphasize the potential transformational power of the technology. The first paper is inspired by the possibility that there will be some form of purely digital money and studies distributed ledgers, proposing and analyzing Hathor, an alternative architecture towards a scalable cryptocurrency. The second paper may be a crucial item in understanding human decision making, perhaps, bringing us a formal model of recognition-primed decision. Lying at the intersection of cognitive psychology, computer science, neuroscience, and artificial intelligence, it presents an open-source, cross-platform, and highly parallel framework of the Sparse Distributed Memory and analyzes the dynamics of the memory with some applications. Last but not least, the third paper lies at the intersection of marketing, diffusion of technological innovation, and modeling, extending the famous Bass model to account for users who, after adopting the innovation for a while, decide to reject it later on.
Huang, Jianyuan. "Computer science graduate project management system". CSUSB ScholarWorks, 2007. https://scholarworks.lib.csusb.edu/etd-project/3250.
Texto completoMedema, Wietske. "Integrated water resources management and adaptive management : shaping science and practice". Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/3531.
Texto completoShearn, Peter Anthony. "Making science visible : new forms of science and technology management and evaluation". Thesis, University of Manchester, 2002. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500670.
Texto completoWason, Jasmin Lesley. "Automating data management in science and engineering". Thesis, University of Southampton, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.396143.
Texto completoMorgan, Edward. "Science & Sustainability: The Use of Science and the Science–Policy Interface in Sustainable Water Resource Management". Thesis, Griffith University, 2015. http://hdl.handle.net/10072/367995.
Texto completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
Griffith School of Environment
Science, Environment, Engineering and Technology
Full Text
Bates, Anthony Shawn. "The Trilogy of Science: Filling the Knowledge Management Gap with Knowledge Science and Theory". ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3977.
Texto completoColavito, Melanie Meyers. "The Role of Science in Collaborative Forest Management". Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/593634.
Texto completoO'Leary, Bethan Christine. "Reconciling science and politics in marine resource management". Thesis, University of York, 2012. http://etheses.whiterose.ac.uk/2599/.
Texto completoLayouni, Mohamed. "Privacy-preserving personal information management". Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Texto completoIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Haggart, Melanie Jane. "Organochlorine management policy in Canada, the challenge of applying science to contaminant management". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq24148.pdf.
Texto completoBoulanger, Jean-Sebastien. "Interest management for massively multiplayer games". Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18280.
Texto completoLa popularité des jeux massivement multijoueurs a augmenté de façon phénoménale au cours des dernières années. Les fournisseurs de jeux rencontrent de plus en plus de problèmes d’extensibilité pour supporter des populations croissantes de joueurs. La diffusion à tous les joueurs des changements réalisés dans le monde virtuel n’est pas une solution viable pour maintenir une vision cohérente du monde dans un jeu massivement multijoueurs. Pour surmonter ce défi d’extensibilité, les jeux massivement multijoueurs doivent utiliser des techniques de gestion d’intérêt sophistiquées qui relaient seulement l’information pertinente vers chaque joueur. Dans cette thèse nous développons une technique de partition de l’espace qui s’adapte aux obstacles du monde virtuel en utilisant une triangulation. Nous présentons des algorithmes sensible-aux-obstacles de gestion d’intérêt qui emploient les partitions triangulaires pour déterminer la pertinence des objets pour chaque joueur, selon l’occlusion créée par les obstacles. Nous comparons l’efficacité des algorithmes sensible-aux-obstacles et d’autres algorithmes modernes de gestion d’intérêt à l’aide de données obtenues d’un vrai jeu massivement multijoueurs. À cet effet, nous utilisons à la fois des actions de vrais joueurs et des actions de joueurs générées par ordinateur. Nous démontrons que les algorithmes sensible-aux-obstacles de gestion d’intérêt peuvent réduirent le nombre de messages relayés entre les joueurs. Nous démontrons également que les algorithmes utilisant notre partition triangulaire peuvent s’adapter à un plus grand nombre d’objets tout en conservant de bonnes performances. Nos expériences suggèrent également que les résultats obtenus à partir de joueurs contrôlés par ordinateur se déplaçant aléatoirement ce rapprochent des résultats obtenus avec de vrais joueurs, dans la mesure où les actions aléatoires des joueurs son
Koosimile, Anthony Tsatsing. "Science curriculum implementation in Botswana". Thesis, University of York, 1999. http://etheses.whiterose.ac.uk/9794/.
Texto completoPapastefano, N. y der Walt SE Arnoldi-van. "A complexity science-based management framework for virtual organisations". African Journal of Business Management, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001182.
Texto completoGonçalves, Leandra Regina. "Regional Fisheries Management Organizations: is power listening to Science?" Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/101/101131/tde-21112016-164951/.
Texto completoUm dos maiores desafios na governança ambiental global contemporânea é o futuro dos ecossistemas e da biodiversidade marinha. Ao longo dos anos, o aumento do esforço de pesca nas áreas anteriormente remotas levou muitas populações de peixes à escassez. As Organizações Regionais para o Ordenamento Pesqueiro (OROPs) surgiram para resolver a crise internacional de pesca, através um fórum onde os Estados-Membros podem acordar e discutir regras vinculativas para a conservação e gestão dos recursos pesqueiros no âmbito da sua área geográfica de responsabilidade. Embora alguns acordos existam há mais de 60 anos, muitos pesquisadores concordam que os mesmos não têm sido totalmente eficazes para promover a manutenção e conservação dos recursos pesqueiros. Muitas razões podem explicar a falta de eficiência no manejo, uma delas é que, o aconselhamento cientifico não é muitas vezes considerado nas decisões políticas. Nesta pesquisa, a influência do conhecimento e da ciência na tomada de decisões políticas serão avaliadas. Para isso, a teoria das comunidades epistêmicas, que faz parte da veia construtivista em Relações Internacionais, foi usada para responder à principal questão colocada aqui: quando é que o poder ouviu a ciência? E isso trouxe mais eficiência em termos do conhecimento proveniente das comunidades epistêmicas induzir os Estados a mudarem seu comportamento e a influência levar a políticas que aumentem a biomassa dos estoques pesqueiros? Com o uso de process tracing, por meio de entrevistas com atores e uma compilação sistemática dos relatórios das reuniões anuais, as OROPS: CCAMLR, ICCAT e CCSBT foram estudadas, e a conclusão final é que, os tomadores de decisão podem ouvir a ciência, porém, a estratégia, os aliados e a forma como a influência se desenvolve varia caso a caso.
Ranj, Bar Amin. "Confidentiality and integrity management in online systems". Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117112.
Texto completoLe rôle prépondérant des réseaux sociaux sur le web change les relations humaines enconduits d'échange d'information. Ainsi, l'information qui est véhiculée sur le web est déterminée en grande partie par les prises de décisions humaines. Conséquemment, la sécurité de l'information, la confidentialité et l'intégrité de l'information partagée dépendentde la qualité des décisions prises collectivement par les utilisateurs. Récemment, plusieurs schémas de contrôle d'accès ont été proposés pour contrôler la propagation non autorisée et la modification de l'information dans les systèmes en ligne. Par contre, il y a encore un besoin de mécanismes dévaluation des risques de fuites d'information et de modifications non autorisées à l'intérieur des systèmes en ligne. Premièrement, la thèse se concentre sur la confidentialité de l'information dans les réseaux sociaux en ligne. Un nouveau mécanisme de contrôle de la confidentialité axé sur la communité pour la gestion de circulation de l'information est présenté. Un algorithme basé sur le modèle Monte Carlo est développé pour déterminer la possibilité de la diffusion des éléments de données partagés ainsi que pour informer l'utilisateur des risques de fuite d'information associés aux différentes décisions de partage que l'utilisateur pourra faire dans un réseau social. Le schéma fournit également une installation pour réduire l'échappement de l'information à un utilisateur spécifique (ex. mettre un utilisateur sur une liste noire). Deuxièmement, la thèse se concentre sur l'intégrité des objets des systèmes de crowdsourcing. Une approche nouvelle pour gérer l'intégrité du contenu créé par les archives de crowdsourcing appelé Gestion de l'intégrité sociale (Social Integrity Management) est présentée. Cette approcheintgre deux approches contradictoires pour gérer l'intégrité des systèmes de crowdsourcing: les schémas basés sur le propriétaire et les schémas sans propriétaires. La problématique de la propriété est d´etendue en incluant la copropriété et la possibilité d'avoir plusieurs versions. Finalement, la thèse présente une analyse complète des sites d'échange commeexemple de système de réponses aux questions par le crowdsourcing qui sont grandement utilisés. L'ensemble de données déchargées est utilisé pour analyser le comportement de différents utilisateurs dans les systèmes de réponses aux questions basés sur le crowdsourcing en considérant les effets d'étiquetage, la réputation des utilisateurs et les commentaires des utilisateurs. Les caract´eristiques observées par les études sont utilisées dans la simulationet l'évaluation de la gérance de l'intégrité sociale.
De, Kock Johannes Marthinus. "Optimal management of MPLS networks". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/52977.
Texto completoENGLISH ABSTRACT: Multiprotocol Label Switching (MPLS) is a routing technology which can manage Quality of Service (QoS) in scalable connectionless networks using relatively simple packet forwarding mechanisms. This thesis considers the optimisation of the QoS offered by an MPLS network. The QoS measure used is the expected packet delay which is minimised by switching packets along optimal label switched paths (LSPs). Two mathematical models of MPLS networks are presented together with appropriate algorithms for optimally dividing the network traffic into forwarding equivalence classes (FECs), finding optimal LSPs which minimise the expected packet delay and switching these FECs along the optimal LSPs. These algorithms are applied to compute optimal LSPs for several test networks. The mathematics on which these algorithms are based is also reviewed. This thesis provides the MPLS network operator with efficient packet routing algorithms for optimising the network's QoS.
AFRIKAANSE OPSOMMING: Multiprotocol Label Switching (MPLS) is 'n roeteringsmetode om die diensvlak (QoS) van 'n skaleerbare, verbindinglose netwerk te bestuur deur middel van relatief eenvoudige versendingsmeganismes. Hierdie tesis beskou die optimering van die QoS van 'n MPLS-netwerk. Die QoS-maatstaf is die verwagte vert raging van 'n netwerk-pakkie. Dit word geminimeer deur pakkies langs optimale "label switched paths" (LSPs) te stuur. Twee wiskundige modelle van MPLS-netwerke word ondersoek. Toepaslike algoritmes word verskaf vir die optimale verdeling van die netwerkverkeer in "forwarding equivalence classes" (FECs), die soektog na optimale LSPs (wat die verwagte pakkie-vertraging minimeer) en die stuur van die FECs langs die optimale LSPs. Hierdie algoritmes word ingespan om optimale LSPs vir verskeie toetsnetwerke op te stel. Die wiskundige teorie waarop hierdie algoritmes gegrond is, word ook hersien. Hierdie tesis verskaf doeltreffende roeteringsalgoritmes waarmee 'n MPLS-netwerkbestuurderj-es die netwerk se QoS kan optimeer.
Pandey, Rinku Omkarnath. "Server management system". Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604881.
Texto completoThe purpose of this project is to study and analyze the Server Management System (SMS) which is a significant and dominating factor in most modern networks and servers that are developed today. Modern day servers and the optimized utilities they offer may have major drawbacks, which can lead to network failure if left unmanaged. They require essential aspects like managing and monitoring. Apart from being able to fullfil high end services, maintenance is still a key. SMS is significant because modern day networks require constant supervision and monitoring. It can be very crucial to a small business or enterprise environment to monitor their servers on a regular basis ensuring that this communication loss does not occur. SMS monitor application servers alert a user for failing components and notify the respective administrator. Monitoring specification for user’s application servers are provided by the user. SMS pings the user’s server and also provides an interface for the user to check the status of servers, irrespective of whether they are active or not. While updating the status of individual application servers, if the SMS sees that the status is inactive, a component of the system will try to restart the server and generate another component to analyze and notify the user about the cause for the failure of the individual application server via mail or messages. In this case, SMS helps the user to monitor their application server and save communication loss by rebooting application servers. Available tools for monitoring application servers cannot be customized according to user requirement. For example, they are not able to check server the status every second, cannot reboot the server, and cannot optimize resources on the server. The SMS uses Event Based Architecture (EBA) which makes it optimized. Implementation of EBA provides customization in SMS. The SMS involves many components that constantly monitor the system. Each component plays a major role in the SMS architecture and provides a real-time monitoring solution for application servers.
Li, Lin Christina Kheng. "The church and management: Synthesis of a reorientation framework for management theories through a theological engagement with management science". Thesis, Australian Catholic University, 2017. https://acuresearchbank.acu.edu.au/download/6f3a468868dff9dd3a1f6766b25ae9b3a576a254872d944db40aef34f48efb71/1652525/Kheng_Li_Lin_2017_The_church_and_management_synthesis_of.pdf.
Texto completoPaucar-Caceres, A. "Business culture and management science methodologies in England and France". Thesis, Manchester Metropolitan University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435608.
Texto completoHeyboer, Maarten. "Knowledge-development in applied science: the case of range management". Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/46039.
Texto completoThis study traces the evolution of the applied ecological discipline of range management in terms of the goals, methods, concepts, and criteria developed by range management for their science between 1897 and 1920. It argues, in contrast to the traditional view uÌ uat describes the knowledge-development process in applied science as just science applied to social problems, that wider social goals, values, concepts, and criteria play a definite role in shaping the applied science knowledge-development process.
The first generation of range management allowed the primary users of the knowledge in the wider society, the stockmen in the West and Southwest, to have a direct influence on the knowledge-development process. The next generation of scientists eliminated the stockmen's direct influence on the knowledge-development process, yet the stockmen still influenced that process indirectly in various ways.
This study concludes that an orientation towards the wider society that actually applies the knowledge is characteristic of range management and may be illustrative of illustrative of many applied sciences. Due to that orientation towards the wider society and to the wider society's influence on the scientist's choice of methods,concepts, and criteria, another characteristic of range management and possibly of other applied sciences is a tension in the knowledge development process between that orientation and the individual goals of scientists in their research.
Master of Science
Мареха, Ірина Сергіївна, Ирина Сергеевна Мареха y Iryna Serhiivna Marekha. "European air quality management: co-production of science and policy". Thesis, Видавництво СумДУ, 2009. http://essuir.sumdu.edu.ua/handle/123456789/8238.
Texto completoWidmer, Walter Martin. "Recreational boating in Sydney Harbour, Australia : science, perceptions and management". Thesis, The University of Sydney, 2003. https://hdl.handle.net/2123/27839.
Texto completoMAROCCO, MARCO. "Digital building management through Digital Twins and Data Science technologies". Doctoral thesis, Università degli Studi di Trieste, 2023. https://hdl.handle.net/11368/3042539.
Texto completoThe management of buildings has been currently gaining momentum in the construction industry. Public and private organisations which deal with managing facilities are interested in and needy to use any means to run their business as best as possible. Indeed, the life cycle of buildings is distributed in an asymmetric way, where the longest part regards the operational phase, leading to a huge importance to this stage. Traditionally, buildings used to be managed by using paper-based documents, personal experience, and manual analysis approaches. This implied loss of data and separated data silos, insights potentially biased in favour of knowledge, and time-consuming tasks. With the advent of the fourth industrial revolution, technology has boosted the opportunities to exploit disruptive tools to effectively manage buildings in a digital way and data has been put in the centre of attention. Although the digital building management can be extremely useful to manage the usage of data, organisations need appropriate methods, tools and skills to handle it. Nevertheless, most of organisations are not ready or capable to embrace innovations and still use old and traditional practices, even if error-prone and less efficient. As a result, the digital building management is not conducted at a reasonable and effective level. In addition to it, not only the abundance of data might be problematic, but also its format, as data is often stored using unstructured formats, leading to the impossibility to effectively exploit it. This leads to the following research questions: What are the methods and technologies that can be exploited in order to improve the building management? How should they be implemented and applied to reach such result? To what extent is data exploitable for the building management enhancement? The manuscript aims to improve the management of buildings. The first research objective concerns implementing the BIM method, defining crucial FM system features and describing how to generate digital models to lay the foundation for an effective digital management of buildings. The second one focuses on proposing solutions for space and maintenance management exploiting innovative technologies and techniques, namely Digital Twins and text-mining algorithms, in order to improve the management of buildings. The outcome of this research is a series of guidelines, which both public and private organisations can use, for enhancing building management.
Nadrowski, Karin, Daniel Seifarth, Sophia Ratcliffe, Christian Wirth y Lutz Maicher. "Identifiers in e-Science platforms for the ecological sciences". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-101319.
Texto completoRodarte, Christopher Gabriel 1975. "Knowledge management in the enhanced traffic management system". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/9659.
Texto completoIncludes bibliographical references (leaves 91-94).
The Enhanced Traffic Management System (ETMS) functions as the primary Database Management System (DBMS) for real-time flight information administered by the Federal Aviation Administration. The ETMS is a mission critical system responsible for facilitating air traffic control throughout the United States. The design of the ETMS represents a pinnacle achievement of modern data management. This thesis project will investigate the development of the ETMS and will identify several recent design decisions that illustrate a paradigm shift in data management techniques. These design decisions portray the initial implementation of a Knowledge-Base Management System (KBMS) wherein the system architecture shifts focus from data management toward knowledge management. DBMS and KBMS technologies will be introduced and compared. Specific implementations of each technology will be discussed and identified in the Enhanced Traffic Management System. Suggestions for further improvements in the ETMS design architecture will be entertained and several alternative design scenarios will be introduced.
by Christopher Gabriel Rodarte.
M.Eng.
AlJabban, Tarek. "Distributed database storage management for a cloud computing infrastructure". Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114556.
Texto completoLes applications Internet ont récemment connu une croissance considérable en termes de taille et de complexité. Afin de satisfaire la forte demande pour les ressources informatiques et les espaces de stockage, les technologies en distribution ont commencé à devenir plus impliquées dans les applications à grande échelle. Le Cloud Computing est l'une de ces nombreuses technologies qui ont émergé pour aider à atteindre les objectifs de ces applications, telles que la haute disponibilité, les performances et l'évolutivité.Platform as a Service (PaaS) est un type de service qui peut être fourni par les solutions de Cloud Computing. Ces systèmes suivent souvent une architecture multi-niveaux qui se compose principalement d'un niveau de présentation, un niveau d'application et d'un niveau de base de données. Les volumes de données échangées entre l'application et la base de données deviennent énormes en particulier pour les applications de niveau entreprise. En conséquence, la conception de la base de données dans les systèmes de Cloud Computing doit prendre en compte le challenge de l'évolution des quantités énormes de données. Dans cette mémoire, nous proposons une approche de distribution des données qui peuvent être utilisées pour améliorer l'évolutivité des bases de données. Nous proposons deux techniques qui peuvent être appliquées à un serveur de base de données unique traditionnelle.Ces techniques fonctionnent en remplaçant le paradigme traditionnel utilisant une seule machine de stockage avec un paradigme de stockage distribué. Les techniques proposées maintiennent les caractéristiques qui existaient à l'origine dans le système de base de données, et en plus fournissent les caractéristiques de la distribution et de la réplication. Ces deux fonctionnalités supplémentaires aident à améliorer le système de tolérance aux pannes, car ils diminuent la possibilité d'avoir une défaillance au niveau du serveur de base de données. La distribution du stockage permet de résoudre les problèmes de performances spécifiques, tels que la réduction de l'utilisation des entrées/sorties et consécutivement de diminuer la possibilité de saturation des entrées/sorties.Par ailleurs, cela produit d'autres défis de performances qui doivent être pris en compte. Pour prouver la faisabilité de nos techniques, nous les avons implémentées comme des extensions du module de gestion de stockage de la base de données PostgreSQL.
Kim, Steven Hyung. "Mathematical foundations of manufacturing science : theory and implications". Thesis, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/15283.
Texto completoMICROFICHE COPY AVAILABLE IN ARCHIVES AND DEWEY.
Bibliography: leaves 161-167.
by Steven Hyung Kim.
Ph.D.
Hendry, Christopher N. "The utilisation of social and behavioural science through consulting". Thesis, Sheffield Hallam University, 1985. http://shura.shu.ac.uk/19783/.
Texto completoBester, Emily Anna. "Patterns in the knowledge management discourse : an analysis of selected knowledge management theorists". Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80329.
Texto completoENGLISH ABSTRACT: Knowledge management is a fragmented and ambiguous management practice. This is evident from the plethora of definitions available for this field. The premise of this study is that different discourse patterns in knowledge management also contribute to the ambiguity. Four theoretical lenses describe the typical discourses that are associated with the formation of management practices, namely management innovation, umbrella construction, management fashion cycles and institutionalisation of management practice. The following propositions are indicative of the types of discourses involved – the rationale, business outcome, management niche, solution definitions and the means provided for the enactment of the practice. The discourses of seven proponents were analysed according to the above, viz. Verna Allee, Nancy Dixon, Leif Edvinsson, Ikujiro Nonaka, Laurence Prusak, David Snowden and Mathieu Weggeman. Three main patterns were identified based on the manner in which the discourses associated with the four theoretical lenses manifest in the analysed discourses. These patterns represent three different conceptualisations of knowledge management, namely - (i) Knowledge management as a meta-practice framework: the focus is on the assimilation and synthesis of the various knowledge-based practices that are part of other management practices (such as quality management), or practices that originate from fluid initiatives in organisations (e.g. the role of the librarian transforming to become a information broker), or practices that are defined through systematic experimentation (such as the potential of social media for intelligence analysis). (ii) Knowledge management as a platform and catalyst for systemic management innovation: the quest is to define new approaches that are appropriate to manage organisations as complex knowledge-based systems. These approaches should supersede management practices still rooted in Newtonian or mechanistic thinking. Knowledge management is regarded to be a revolutionary practice that proposes, conceptualises and diffuses such new approaches, e.g. value network management (Verna Allee) and the Cynefin framework (David Snowden). (iii) Knowledge management as a master idea or master narrative: this knowledge management discourse is about the theorisation of novel structural arrangements that emerge in organisations as a response to the new requirements of a knowledge-driven economy. This theorisation influences the thinking, premises and practices of various management fields, such as strategic planning, human resource management and organisational design.
AFRIKAANSE OPSOMMING: Kennisbestuur is ‘n gefragmenteerde en dubbelsinnige bestuurspraktyk. Dit is duidelik uit die menigvuldige definisies wat voorgehou word vir die veld. Die uitgangspunt van hierdie studie is dat verskillende diskoerspatrone in kennisbestuur ook tot die dubbelsinnigheid bydra. Vier teoretiese lense beskryf die tipiese diskoerse wat geassosieer word met die vorming van bestuurspraktyke, naamlik bestuursinnovasie, sambreelkonstruksies, bestuursmodesiklusse en die institutionalisering van bestuurspraktyke. Die volgende aspekte is ‘n aanduiding van die tipes diskoerse betrokke – die rasionaal, besigheidsuitkoms, bestuursnis, die definisie van die oplossing en die middele wat vir die implementering van die praktyke verskaf word. Die diskoerse van sewe voorstaanders is geanaliseer aan die hand van bogenoemde, naamlik Verna Allee, Nancy Dixon, Leif Edvinsson, Ikujiro Nonaka, David Snowden en Matthieu Weggeman. Drie hoofpatrone is geidentifiseer, gebaseer op die analise van die wyse waarin die vier teoretiese lense in die geselekteerde diskoerse manifesteer. Hierdie patrone verteenwoordig drie verskillende konsepsualiserings van kennisbestuur, naamlik - (i) Kennisbestuur as ‘n meta-praktykraamwerk: die fokus is op die assimilasie en sintese van die verskillende kennisgebaseerde praktyke wat deel is van ander bestuurspraktyke (soos kwaliteitsbestuur), of praktyke wat ontwikkel uit vloeibare inisiatiewe in organisasies (bv. die rol van die bibliotekaris wat transformeer na die van ‘n informasiemakelaar), of die definisie van nuwe praktyke aan die hand van sistematiese eksperimentering (soos die potensiaal van sosiale media vir intelligensie analise). (ii) Kennisbestuur as ‘n platform en katalisator vir sistemiese bestuursinnovasie: die strewe is om nuwe benaderings te definieer wat toepaslik is vir die bestuur van organisasies as komplekse kennis-gebaseerde stelsels. Hierdie benaderings moet bestuurspraktyke wat gewortel is in Newtoniaanse of meganistiese denke vervang. Kennisbestuur word beskou as ‘n revolusionêre praktyk wat nuwe benaderings voorstel, konsepsualiseer en versprei, soos Value Network Management (Verna Allee) en die Cynefin-raamwerk (David Snowden). (iii) Kennisbestuur as ‘n meesteridee of meesternarratief: hierdie kennisbestuurdiskoers omvat die teoretisering van nuwe strukturele reëlings wat, as ‘n reaksie op die nuwe vereistes wat ‘n kennisgedrewe ekonomie stel, in organisasies na vore kom. Hierdie teoretisering beïnvloed die denke, begronding en praktyke van verskeie bestuursvelde, soos strategiese beplanning, menslike hulpbronbestuur en organisasie-ontwerp.
Mitchell, Melissa. "Strategic human resource management plan for Task Applied Science (Pty) Ltd". Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/96217.
Texto completoHuman resource management is a widely researched field. However, the research done in terms of small to medium-sized enterprises, is extremely limited, especially in South Africa. The aim of this research was to investigate human resource management practices in one such a company, and to develop a feasible action plan to improve on these practices. The chosen company, Task Applied Science (Pty) Ltd, is a medical research company based in Cape Town, South Africa. The data for the study was obtained through a literature review and interviews. The data from the literature review identified best practices and frameworks. This was combined with interviewing company employees as well as HRM practitioners in the medical field to not only identify problems, but to also suggest possible solutions. These solutions were compiled in a comprehensive action plan. As such, the results offer a workable solution for Task Applied Science, and can serve as example for all small to medium-sized enterprises. The literature review further showed that smaller companies tend to ignore the importance of human resource management due to the time and costs involved and the fact that they are focussed on the external environment rather than the internal. This cannot simply be remedied by implementing practices developed in large companies. Best practices need to be customised to fit the needs of the specific company. The findings showed that only certain human resource management practices were implemented in reaction to crises, or as needs arose. This, combined with the rapid growth and lack of structure, caused a breakdown in communication, transparency, and trust. Staff loyalty decreased because they felt that they were left in the dark. Both the company strategy and values became vague, and thus staff could not be aligned to it. Noteworthy was that the increase in policies and documentation did not cause employees to feel restricted, but rather that it created a feeling of security. The study made it abundantly clear that the human resources department needs to be treated as a strategic partner in the planning and execution of the company strategy; especially in terms of efficient change management. Their role is to communicate the strategic direction, while at the same time acting as an activist for the staff, voicing their needs and capabilities. The proposed action plan focused mainly on the company culture and the alignment of staff with the company’s business strategy. This was done by addressing issues such as company culture, communication, company values, and staff development. The plan offers practical solutions within each of these categories. Furthermore, it suggests solutions in terms of efficient staff recruitment and knowledge management. By implementing this plan the company will be able to increase the synergy between the business units within the company, eradicating silos, and establishing the staff as a competitive advantage. In addition to this, it will establish the human resources department as a credible partner for the staff in developing both their personal and professional lives.
Gabor, Brian. "EXP-WF : a workflow management module for web-based laboratory information management systems". Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82234.
Texto completoSimon, Katie. "Finding synergistic conservation values? Māori tikanga, science, resource management and law". The University of Waikato, 2007. http://hdl.handle.net/10289/2639.
Texto completoAbouarghoub, Wessam M. T. "Implementing the new science of risk management to tanker freight markets". Thesis, University of the West of England, Bristol, 2013. http://eprints.uwe.ac.uk/20836/.
Texto completoNelson, Tayler L. "Biomedicine, "Body-Writing," and Identity Management: The Case of Christian Science". Thesis, Boston College, 2011. http://hdl.handle.net/2345/1835.
Texto completoBiomedicine has become a gatekeeper to numerous social opportunities and has gained power through the ritual inscription of individual bodies. Bodies serve as intermediaries between personal identities and biomedicine; individuals can reclaim bodies as sites of "identity projects" (Giddens 1991) to resist biomedical power. This project examines the intersection of the societal preoccupations with biomedicine, bodies, and identity through the lens of the religious and healing tradition of Christian Science. Christian Science theologically rejects biomedicine in favor of spiritual healing treatment. Christian Science is an especially appropriate venue for exploring relationships between biomedicine, bodies, and identities because its teachings require not only belief in the ineffectiveness of biomedicine but also embodied resistance to it. Drawing on the work of Foucault (1977), Giddens (1991), and Frank (1995) and using information gleaned from semi-structured interviews--averaging 1.5 hours in length--with 12 Christian Scientists, I argue that Christian Scientists use religious identities to (1) evade biomedical risk society, (2) resist external authority and reclaim bodies as sites of knowledge and power, and (3) build spiritual community
Thesis (MA) — Boston College, 2011
Submitted to: Boston College. Graduate School of Arts and Sciences
Discipline: Sociology
Houdek, Petr. "Essays on Economics and Management: Applications of Behavioral Science in Organizations". Doctoral thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-262137.
Texto completoLidskog, Rolf. "Radioactive and hazardous waste management in Sweden : movements, politics and science /". Uppsala : Uppsala University, 1994. http://catalogue.bnf.fr/ark:/12148/cb35723455s.
Texto completoExter, Kristin den. "Integrating environmental science and management the role of system dynamics modelling /". Connect to this title online, 2004. http://thesis.scu.edu.au/adt-NSCU/public/adt-NSCU20041214.143956/.
Texto completoLengyel, David M. "A Critical Examination of the Relationships Between Risk Management, Knowledge Management and Decision Making". Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10931990.
Texto completoThe goal of this research is to critically examine the nexus of risk management, decision-making, and knowledge management in an integrated framework, or triad. This research will examine this framework through the lens of managers in both human and scientific spaceflight missions at the National Aeronautics and Space Administration (NASA). It is intended to expose how coupling risk, knowledge and decision-making improve chances for mission success while potentially averting mishaps. Historical case studies of NASA Programs will be used to validate this assertion. Common risk management and knowledge management processes will be examined as enablers for risk-informed decision-making, particularly for residual risk acceptance decisions. Decision-making under normal programmatic conditions as well as during anomalous or mishap-related conditions will also be assessed.
Residual risk acceptance decision-making might be considered a special case of a requisite decision analysis model. In the context of NASA programs and projects these decisions are made throughout the lifecycle. They take on special significance however in the context of human spaceflight missions such as whether to: proceed with human-tended test and evaluation, to launch, or to respond to an off-nominal condition on-orbit. Finally, this dissertation offers a checklist for use by managers to improve residual risk acceptance decision competency within an organization.
Ganesan, Prasanna. "Context information management using agents". Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26640.
Texto completoPalmieri, David Walsh. "Knowledge Management Through Pair Programming". NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-20020328-093026.
Texto completoKnowledge Management has been the subject of increasing focus over the last several years. Literature and research on the topic has grown as companies and organizations have come to realize that success is often determined by one's ability to create, disseminate, and embody knowledge in products and services. This realization has led to increased interest in examining the ways in which knowledge can be effectively created, identified, codified, disseminated, and retained. The field of Knowledge Management has emerged to address this need.
One of the obstacles that Knowledge Management seeks to overcome is the natural tendency in people to hoard knowledge. People often withhold knowledge when they feel it provides them with a competitive advantage over others. Many traditional management incentives and team structures create and perpetuate competitive environments that encourage knowledge hoarding. Knowledge Management also seeks to find ways to reduce the impact of employee turnover. When an employee leaves a company or organization, the knowledge they possess often goes with them. This loss can potentially have a negative impact on the productivity and quality of the company or organization. Knowledge Management seeks to find ways to minimize loss of knowledge when an employee leaves a company or organization.
Pair programming is a practice that holds promise for overcoming some of the challenges faced by Knowledge Management. In pair programming, two programmers work side-by-side at one computer collaborating on the same design, algorithm, code, or test. The continual interaction between pair programmers would seem to provide an environment that promotes knowledge sharing, and collaborative knowledge discovery. Additionally, through pair rotation, in which pairs change partners fairly often, tacit knowledge might be spread more effectively through face-to-face communication than by documentation, databases, or other means.
This research examines pair programming in the realm of Knowledge Management, positing the following hypotheses:Pair programming reduces the tendency of people to hoard knowledge.Pair programming reduces the impact of employee turnover.Pair programming is an effective means of knowledge dissemination and knowledge retention that has a positive influence on the Knowledge Management practices of a company or organization.
These hypotheses are tested through the use of a survey of individuals in technology research, development, and service. Analysis of the survey results provided no conclusive evidence to either support or disprove the hypothesis that pair programming reduces the tendency of people to hoard knowledge. The results indicate support for the hypothesis that pair programming reduces the impact of employee turnover, although not statistically significant. And finally, the survey results indicate with statistical significance that pair programming is an effective means of knowledge dissemination and retention, with a positive influence on the Knowledge Management practices of a company or organization.
Eklund, Pieta. "Knowledge management på en dagstidning". Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16347.
Texto completoUppsatsnivå: D
Chang, Sharon Elaine. "Interdatabase consistency management". Thesis, Massachusetts Institute of Technology, 1990. https://hdl.handle.net/1721.1/128795.
Texto completoIncludes bibliographical references (p. 77-78).
by Sharon Elaine Chang.
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1990.
Tang, Fugui. "A proximity determinable social pseudonym framework in online identity management system". Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=107858.
Texto completoDans le contexte d'Internet, les identifiants des usagers jouent un rôle critique. L'un des avantages des identifiants traditionnels, soient les pseudonymes, est de fournir une protection de la vie privée des usagers. Les usagers peuvent créer autant d'identifiants anonymes qu'ils le désirent simplement en utilisant une adresse courriel. Par contre, l'anonymité même peut devenir un facteur limitant dû à la déresponsabilisation des usagers. L'importance des réseaux sociaux en ligne nous inspire à créer un système de pseudonymes sociaux à travers lequel il sera possible de déterminer la proximité entre pseudonymes tout en conservant la confidentialité. Le système se base sur l'idée d'associer un réseau social à un espace géométrique et d'assigner des coordonnées à chaque usager qui dépendent de la relation entre l'usager et son voisinage. Les coordonnées elles-même ne fournissent aucune information confidentielle à propos d'un usager. Cependant, en calculant la distance entre différentes coordonnées, la proximité entre usagers peut être estimée avec une certaine probabilité. J'ai évalué le système avec des données provenant de réseaux sociaux réels. Les résultats indiquent que le système proposé, en imposant certaines conditions, est prometteur.
Munzhelele, Tshililo. "Knowledge management and service delivery : a knowledge management model for the housing sector". Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20126.
Texto completoENGLISH ABSTRACT: Die Suid-Afrikaanse regering en sy organisasies en instellings, net soos ander internasionale state, word gekonfronteer met uitdagings om hul bates te bestuur, soos onder andere data, inligting, kennis, mense en prosesse. Hierdie uitdagings tel onder die faktore wat dienslewering negatief beinvloed. Alhoewel die Departement van Behuising ongeveer twee miljoen en sewe honderd duisend huise gelewer het, sedert 1994 was daar nog steeds uitdagings. Gepaardgaande met swak dienslewering, het die Departement ook gesukkel om bates soos inligting, kennis, inligtingstegnologie en menslike hulpbronne te bestuur. Alhoewel dit uitgebreide beleggings gemaak het in inligting tegnologie, veral in die ondersteuningsdienste, het die departement nog nie die tegnologie ten volle benut nie. Die tesis poog om die positiewe aspekte te ontdek wat deur die toepassing van kennisbestuur binne die behuisingsektor oor al drie regeringsvlakke teweeggebring kan word. ‘n Vraelys is versprei onder beamptes wat die bestaande behuisingsinformasie-sisteme gebruik in die areas van behuisingsubsidie administrasie, monitering en evaluering en projekbestuur afdelings in die behuisingsektor. Gebaseer op die bevindinge van die vraelys word ‘n kennisbestuursmodel vir die behuisingsektor voorgestel wat dienslewering kan bevorder.
AFRIKAANSE OPSOMMING: Die Suid-Afrikaanse regering en sy organisasies en instellings, net soos ander internasionale state, word gekonfronteer met uitdagings om hul bates te bestuur, soos onder andere data, inligting, kennis, mense en prosesse. Hierdie uitdagings tel onder die faktore wat dienslewering negatief beinvloed. Alhoewel die Departement van Behuising ongeveer twee miljoen en sewe honderd duisend huise gelewer het, sedert 1994 was daar nog steeds uitdagings. Gepaardgaande met swak dienslewering, het die Departement ook gesukkel om bates soos inligting, kennis, inligtingstegnologie en menslike hulpbronne te bestuur. Alhoewel dit uitgebreide beleggings gemaak het in inligting tegnologie, veral in die ondersteuningsdienste, het die departement nog nie die tegnologie ten volle benut nie. Die tesis poog om die positiewe aspekte te ontdek wat deur die toepassing van kennisbestuur binne die behuisingsektor oor al drie regeringsvlakke teweeggebring kan word. ‘n Vraelys is versprei onder beamptes wat die bestaande behuisingsinformasie-sisteme gebruik in die areas van behuisingsubsidie administrasie, monitering en evaluering en projekbestuur afdelings in die behuisingsektor. Gebaseer op die bevindinge van die vraelys word ‘n kennisbestuursmodel vir die behuisingsektor voorgestel wat dienslewering kan bevorder.
Bannister, H. C. "The science of determining norms for the planning and management of software development projects". Thesis, Stellenbosch : University of Stellenbosch, 2000. http://hdl.handle.net/10019.1/4652.
Texto completoAFRIKAANSE OPSOMMING: Die meeste mense in die sagteware industrie erken dat om sagteware te ontwikkel teen voorspelbare tydskedules, gevaar inhou en nie maklik is nie. Hulle ondervind probleme om te skat hoe lank die ontwikkeling van sagteware hulle gaan neem. Onderskatting lei tot te min hulpbronne en te kort skedules. Dit veroorsaak uitbrand van mense, lae kwaliteit en einddatums wat nie gehaal word nie. Oorskatting is byna net so erg. Parkinson se Wet dat werk geskep word om beskikbare tyd te vul, kom in aksie en aan die einde beteken dit die projek neem so lank as wat geskat is, selfs al is dit oorskat. Huidiglik doen mense nie veel moeite om tyd te skat op take nie en daarom neem projekte so lank as wat dit neem om te voltooi. Metodes om onsekerheid te bestuur lei tot die byvoeg van oormatige veiligheidstyd net om dit daarna weer te verkwis. Die besigheid verskaf gewoonlik 'n mikpunt vir die projek met geweldige druk vir lae skattings tydens bieery en op die ou end raak hierdie mikpunt die projekplan. Die beste manier om dit die hoof te bied is om die gaping tussen hierdie mikpunt en die skatting te bestuur as 'n projek risiko. Niemand kan akkuraat skat sonder 'n effektiewe metode van werk afbreek nie. Vakkundiges behoort die projekbestuurder te help om die detail van hoe die werk gedoen gaan word, te beplan. 'n Funksionele ontwerp deur 'n stelselsargitek help om die tegniese take verder af te breek. Dit is baie belangrik aangesien take wat uitgelaat word, nie in die skatting ingesluit gaan word nie. Die eerste stap om by gesonde skattings uit te kom, is om grootte te skat. Dit is besonder moeilik in die aanvanklike fase, dog kan oorkom word indien die maatskappy geskiedenis stoor van hoe groot voltooide take was en hoe lank dit geneem het. Alhoewel Iyne kodering die mees algemeenste vorm van meting van grootte is, Iyk dit asof funksie punte of funksie blokke beter werk, veral by die aanvanklike skatting. Indien 'n organisasie nie historiese data stoor nie, is dit nou die tyd om daarmee te begin. Die voorgestelde prosedure om te volg voordat informasie gestoor word, is om te definieer wat gestoor gaan word (norme te bepaal), om die data af te baken, dissipline toe te pas by die insameling, dit te stoor in 'n gevestigde databasis en dit beskikbaar te stel in bruikbare formaat. Die instrument wat gebruik word om hierdie syfers te stoor moet voorsiening maak vir die inbou van faktore wat produksie beinvloed, soos kompleksiteit, vlak van vaardigheid, verstreke tyd, personeel omset, ens. Daar bestaan menige verskillende tegnieke vir skatting. Die beste opsie blyk 'n kombinasie van skattings te wees. Die opinie van die programmeur asook een wiskundige metode soos funksie punt analise, behoort deel te wees hiervan. Soos alle ander werksprosesse, moet skattings vir sagteware ontwikkeling ook bestuur word en dit word metrieke bestuur genoem. Hierdie proses behels dat daar besluit moet word op een of ander model. Empiriese modelle gebaseer op 'n databasis waarin data gestoor word deur die maatskappy self, gee die beste resultate. Twee baie goeie modelle is die Putnam model en die Parr model (vir kleiner projekte). Selfs die beste model en proses is egter nooit perfek nie. Die estimasie proses moet dus voortdurend gemonitor word deur werklike tye met geskatte tye te vergelyk. Wees versigtig met terugvoer aangaande hoe akkuraat skattings was. Geen terugvoer is die ergste oortreding. Die beste oplossing skyn te wees om die implikasie van die onderskatting met die persoon wat die skatting gedoen het, te bespreek en koppe bymekaar te sit om die probleem op te los.
Tambasco, Michael J. "Global scale identity management". Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1600350.
Texto completoGlobal scale identity management attempts to be the system of identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and software applications when accessing critical information technology (IT) systems from anywhere. The term global-scale is intended to emphasize the pervasive nature of identities and implies the existence of identities in federated systems that may be beyond the control of any single organization. The purpose of this research was to analyze the current state of Global Scale Identity Management. Today, news of security breaches is far too commonplace. The results reveal that global scale identity management would have a positive effect on the individual person, businesses, government agencies, and institutions. However for global scale identity management to be operational much work remains. The remaining work is split between the physical realm, i.e., biometric equipment, quantum resistant cryptography, and the abstract realm, i.e., legal considerations, social and cultural mores, privacy issues, and international considerations. The research concluded that humans are repeatedly the weak link in password security that ultimately undermines a system’s stability. For the short term, the best suggestion is to use password managers and have systems disallow poor password choices. For the long-term build infrastructures with quantum resistant cryptography interfacing with the ubiquitous smartphone to provide multifactor authentication.